English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113318/144297 (79%)
Visitors : 51054696      Online Users : 929
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    政大機構典藏 > 資訊學院 > 資訊科學系 > 學位論文 >  Item 140.119/113293
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/113293


    Title: 分散式環境中基於聲譽的信任度評估機制及其在智能合約之應用
    Reputation-based Trust Evaluation Mechanism for Decentralized Environments and It’s Application Based on Smart Contracts
    Authors: 詹琨泰
    Chan, Kun-Tai
    Contributors: 左瑞麟
    Tso, Raylin
    詹琨泰
    Chan, Kun-Tai
    Keywords: 區塊鏈
    去中心化
    PGP
    智能合約
    小世界理論
    信任度
    Blockchain
    Decentralized
    PGP
    Smart contract
    The Small World Problem
    Trust degree
    Date: 2017
    Issue Date: 2017-10-02 10:16:16 (UTC+8)
    Abstract: 近年來區塊鏈技術及其相關應用成為熱門焦點,區塊鏈最大的特色包含去中心化以及匿名性等特性,然而在這樣的分散式網路中我們很難判斷對方是否值得信賴,在數位憑證中我們透過可信賴第三方擔任憑證中心為用戶簽發金鑰憑證以此建立用戶之間的信賴關係,但在區塊鏈此種分散式網路中找到一個可信賴第三方實屬不易,並且可能會與區塊鏈去中心化之特性背道而馳,因此本研究參考PGP信任網與小世界理論的概念,建立一套可適用於分散式環境中基於聲譽的信任度評估機制,並將此機制結合智能合約實現一個信任度評估機制購物平台,目的希望用戶與陌生人交易前,可透過此機制計算出信任度,提供用戶做為參考,幫助用戶更容易判斷陌生人是否可信,以降低受騙風險。
    In recent years, the blockchain technology and its relevant applications become hot spots. The greatest feature of the blockchain is the decentralization. Nonetheless, it is difficult for us to judge whether the other person get involved in the decentralized network is credible. Furthermore, it is difficult to find a reliable third party in such a point-to-point network. Consequently, this paper refers to the PGP web of trust and the small world problem to establish a set of reputation-based trust evaluation mechanism for decentralized environments, we combine this mechanism with a smart contract to achieve a trust evaluation mechanism shopping platform, It is expected that achievements of the paper can facilitate people’s judgment regarding the reliability of strangers and reduce the risks of being deceived.
    Reference: [1] Garfinkel, S. (1995). PGP: pretty good privacy. " O`Reilly Media, Inc."
    [2] Zyskind, G., & Nathan, O. (2015, May). Decentralizing privacy: Using blockchain to protect personal data. In Security and Privacy Workshops (SPW), 2015 IEEE (pp. 180-184). IEEE.
    [3] Zhang, F., Cecchetti, E., Croman, K., Juels, A., & Shi, E. (2016, October). Town crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(pp. 270-282). ACM.
    [4] Travers, J., & Milgram, S. (1967). The small world problem. Phychology Today, 1, 61-67.
    [5] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
    [6] Andrychowicz, M., Dziembowski, S., Malinowski, D., &Mazurek, L. (2014, May). Secure multiparty computations on bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 443-458). IEEE.
    [7] Li,Y. M., Chen, J. C.,&Li, T. Y.(2007, May). A Blog System with Trust Mechanism.18th International Conference on Information Management.
    [8] Meng, X. F., Zhang, L., & Wang, X. (2009). Research on trust model of P2P electronic commerce [J]. Application Research of Computers, 8, 077.
    [9] Qiao, X. Q., Yang, C., Li, X. F., & Chen, J. L. (2011). A trust calculating algorithm based on social networking service users` context. JisuanjiXuebao(Chinese Journal of Computers), 34(12), 2403-2413.
    [10] Gao,Y.,&Yuan, Y. (2014). The Research on Global Trust Algorithm Based on Social Network.from: http://www.paper.edu.cn.
    [11] 許鑫, &翟曉娟. (2008). 信任度計算與信任傳遞協議設計的研究. 現代
    圖書情報技術, 24(3),(pp. 32-39).
    [12] Recommendation-for-Key-Management-Part1: General ,
    from:http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
    [13] 智能合約-MBA智庫百科,
    from:http://wiki.mbalib.com/zh-tw/%E6%99%BA%E8%83%BD%E5%90%8
    8%E7%BA%A6
    [14] Facebook research,
    from: https://research.fb.com/three-and-a-half-degrees-of-separation/?hc_
    location=ufi
    [15]Heineman, G. T., Pollice, G., &Selkow, S. Algorithms in a Nutshell, Oreilly
    Media. ISBN 978-0-596-51624-6.
    [16] Stallings, W., &Tahiliani, M. P. (2014). Cryptography and network security:
    principles and practice (Vol. 6). London: Pearson.
    [17]結城浩.(2011). 密碼學與網路安全應用.旗標出版股份有限公司.
    [18]林展民.(2016). 以智能合約實現快速醫療保險理賠.國立政治大學資訊
    科學系碩士論文.
    Description: 碩士
    國立政治大學
    資訊科學學系
    104753006
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0104753006
    Data Type: thesis
    Appears in Collections:[資訊科學系] 學位論文

    Files in This Item:

    File SizeFormat
    300601.pdf2449KbAdobe PDF2158View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback